Introduction
Introduction
We collect and use your information in accordance with the policy, However, we will not collect it in a package as a way to force bundles even if you agree with this Policy.\nWhen you use the services or turn on features, we collect and use the necessary information for the functionality and services. You may refuse to provide and it does not affect other features or services unless necessary to achieve basic business functions or as required by law and regulation. We will itemize what is necessary in the Policy.\nIf your account is not signed in, We will guarantee the basic function of information push by using the device's corresponding identifier information.If you log in to your account, we will implement information push based on account information.\nContacts, precise geographic locations, cameras, microphones, photo album permissions are not turned on by default, only when you are authorized to use them for specific features or services, or you can withdraw authorization. In particular, we do not collect your information when the relevant features or services are not required, even if we have obtained these sensitive permissions with your authorization.\nThis Policy applies to your access to and use of our services through AGEasy Empower applications, AGEasy Empower software development Kit (SDK) and application Programming Interface (API) for third-party websites and applications.\nThe following will help you learn more about how we collect, use, store, transfer, share, transfer (if applicable) and protect personal information,and understand how to query, access, delete, correct, and withdraw authorized personal information.Among them, the important content of the terms about your personal information interests we have been prompted in bold form, please pay particular attention to this part.\n1. How we collect and use personal information\n2. Additional information for permission to use\n3. Additional information on the use of third-party (SDK / API / H5) access rights\n4. How we use similar technologies like cookies\n5. How we share, transfer, and publicly disclose personal information\n6. How we store personal information\n7. How we protect the security of personal information\n8. Manage your personal information\n9. Terms of use for minors\n10. Changes and notifications of the Policy\n11. Contact us\n", title: 'This policy will help you understand:
privacyPolicyElement
privacyPolicyElement
We collect information you provide to us directly when you use the Services.:\n1.1 Sign up, log in, authenticate\n1.1.1 Sign up and Login\na. When you Sign up and log in to our services, to create an account, you must provide the relevant network identification information (avatar, nickname, password). You can choose to fill in your gender, birthday, region, and personal profile to complete your information.At the time,we also store your user account preferences and settings. \nb. You may also use a third-party account to login and use AGEasy Empower, and you will authorize us to obtain public information (avatars, nicknames and other information that you authorize) registered on the third-party platform for binding to AGEasy Empower account so that you can log in directly and use our services.\n1.1.2 Authenticate\nWhen you use a feature or service for authentication (Parenting or Counselor), according to relevant laws and regulations, You may need to provide your real identity information (phone number) or relevant certificate (psychologist qualification) to complete the verification. This information is sensitive to personal information that you may refuse to provide, but you may not be able to access the services without affecting the normal use of other features and services. \n1.2 Information browsing\na. AGEasy Empower may recommend information that you are interested in, and we may collect the necessary log information to achieve this feature.\nb. The log information used for information display includes:\nActions you take when using the Services: click, follow, favorite, search, browse, forward\nInformation you provide on your initiative: feedback, post, like, comment\nGeographical information: Sensor information such as GPS information, Wi-Fi access points, Bluetooth and base stations\nc . The above information we collect and use is de-identified, and data analysis corresponds only to specific, unrelated codes that do not directly relate to your identity and are not associated with your real identity.\n1.3 Function and Interaction\n1.3. 1 Function\na . When you use features related to uploading images, WeChat, Chat and video chat, we will ask you to authorize your camera, photo, microphone. If you refuse, you will not be able to use this feature, but it will not affect the normal use of other features.\nb . When you use an " IoT SIM card" for real-name authentication according to the requirements of laws and regulations, you need to verify your identity through "face recognition" . In the process, the Third Party Certification Agency requires you to provide real name, ID number and facial feature value information. This information is sensitive to personal information that you can refuse to provide without affecting the normal use of other features. This information is only for real-name authentication and purposes specified by laws and regulations and it will not be used for other purposes without your express authorization. \n1.3. 2 Release Information\na. When you post content, comments, questions or answers, we will collect information about your posts and display your nicknames, avatars, and published content.\nb . When you post and select a display location, we will ask you to authorize geographic location permissions and collect location information related to this service. If you refuse to provide accurate geographic location information, you will not be able to use this feature, but it will not affect the normal use of other features.\nc .We collect information you provide to us when you use the services (such as information related to you in comments, messages, post graphics, audio and video).\n1.3. 3 Interactive Communication\na. When you actively follow and interact with the accounts and circles that you are interested in, and browse, comment, collect, like or forward content, we collect the accounts you follow and show you what you care about.\nb. When you add contacts by using the Phone Book, Receipt Address feature, we will request contacts permission and encrypt the information in the address book with an encryption algorithm. Contacts information is sensitive personal information, if you refuse to provide,it will only prevent you from using the Quick Add feature, use of other features on AGEasy Empower would not affect.\n1.4 Search\nWhen you use the search service on AGEasy Empower, we will collect your search keyword information and log records. To provide you an efficient search service, some of the information is temporarily stored on your local storage device and shows you the results and history of what\'s been searched.\n1.5 Safe Operation\n1.5.1 Security Features\nWe are committed to providing you a safe, trusted product and environment,and providing quality and reliable service,and it is our core goal. Information collected to achieve security features is essential.\n1.5.2 Device Information and Log Information\na. To keep your software and services running securely, we collect your hardware model, operating system version number, international mobile device identification number, unique device identifier, network device hardware address, IP address, Wi-Fi access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, Use, service logs.\nb. To prevent malicious programs and secure operations, we collect installed application information or process information that is running, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, application sources.\nc. We may use your account information, device information, service log information, and information that our affiliates and partners may use to determine account security, authenticate, detect, and prevent security incidents when you are authorized or legally available to you.\n1.6 Changes in the Purpose of Collecting and Using Personal Information\nPlease be aware that as our business grows, changes may be made to the functionality and services provided by us. In principle, when new features or services are relevant to the features or services we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. We collect and use your personal information in a situation where there is no direct or reasonable association with the original processing purpose, and we will inform you again and re-obtain your consent.\n1.7 Exemption From Obtaining Consent To Collect and Use Personal Information\nPlease understand that in accordance with laws and regulations and relevant national standards,we collect and use your personal information without your authorization in the following cases :\na.Those Directly related to national security, national defense security;\nb.Those Directly related to public safety, public health, and major public interests;\nc.Those Directly related to criminal investigation, prosecution, trial and enforcement of sentences;\nd.Those For the purpose of safeguarding the personal information subject or other personal life, property and other important legal rights and interests which is difficult to obtain an individual\'s consent;\ne. Those The personal information we collect is that you disclose to the public by yourself;\nf. Those Personal information collected from legally publicly disclosed information, such as legitimate news reports, government information disclosure, etc.;\ng. Those Necessary to enter or perform a contract according to your request.;\nh. Those Necessary to maintain the safe and stable operation of the software and related services, such as the detection, disposal of software and related service failures;\ni. Those Necessary for legal news reporting;\nj. Those Academic research institutions need to carry out statistical research or academic research based on the public interest, and de-identifying the personal information contained in the results when the results of academic research or description are provided to the outside world;\nk. Those Other situations as required by laws and regulations.\nPlease be reminded that if the information cannot be personally identified individually or in conjunction with other information, it does not belong to your personal information legally; When it can or we will be able to use data that cannot be linked to any particular personal information in conjunction with other personal information, It will be processed and protected as your personal information in accordance with this Policy during the time we combined these information.\n', title: '1. How we collect and use personal information
privacyPolicyElement
privacyPolicyElement
In order to provide you a better experience, we would access high-quality third parties. And we will carefully evaluate the purpose of the use of shared information by related parties and third parties, conduct a comprehensive assessment of the security from them, and require them to comply with the Cooperative Legal Agreement. We will conduct strict security monitoring on software tools that partners obtain information,like software development kits (SDK), application program interfaces (API) , and H5 to protect data security. And sharing your personal information with our affiliates and third parties through your authorization and consent, unless the shared personal information is de-identified information, and the natural person subject who shared the third party cannot re-identify such information. If related parties and third parties use it beyond the scope of the original authorized consent, they need to re-obtain your consent.\n3. 1 Affiliate Advertising (SDK)\nPermissions are required as follows:\n1. Obtain carrier information;\n2. Access to Wi-Fi network information;\n3. Read your phone's current status;\n4. Access to network permissions;\n5. Write / read external storage device;\n6. Location;\n7. Installation;\n8. Obtain task information;\n9. Power management operation.\n3 . 2 Mobile Payment (SDK)\nPermissions are required as follows:\n1.Access to network ;\n2. Obtain network status;\n3. Obtain Wi-Fi status;\n4. Read your phone's current status;\n5. Write external storage devices;\n6. Modify sound settings.\n3.3 Push System (SDK)\nPermissions are required as follows:\n1.Access to network;\n2. Write external storage devices ;\n3. Obtain network status ;\n4. Obtain Wi-Fi status ;\n5. Read your phone's current status ;\n6. Installation ;\n7. Obtaining task information;\n8.OPPO mobile message (only for OPPO mobile phones);\n9. MEIZU mobile phone message (only for Phone model MEIZU).\n3.4 Video Call (SDK)\nPermissions are required as follows:\n1. Open camera device;\n2. Change network status (e.g. whether you can access the network );\n3. Modify sound settings;\n4. Recording;\n5. Access to network ;\n6. Write external storage device;\n7. Obtain network status ;\n8. Obtain Wi-Fi status ;\n9. Read your phone's current status;\n10. Read external storage devices ;\n11. Wake lock .\n3.5 Himalayan (SDK)\nPermissions are required as follows:\n1. Write external storage device\n2. Access to network\n3. Recording\n4. Obtain network status\n5. Obtain Wi-Fi status\n6. Use the front desk notification service\n7. Camera\n3.6 Fengfeng school (H5)\nPermissions are required as follows:\n1. Encrypted order data synchronization permission\n